International Journal of Information and Computer Security (IJICS)

International Journal of Information and Computer Security

2020 Vol.13 No.3/4


Pages Title and author(s)
249-267CFM: collusion-free model of privacy preserving frequent itemset mining
Yoones A. Sekhavat
DOI: 10.1504/IJICS.2020.10029283
268-288Towards automated SCADA forensic investigation: challenges, opportunities and promising paradigms
Mohamed Elhoseny; Hosny Abbas
DOI: 10.1504/IJICS.2020.10029284
289-308Fast causal division for supporting robust causal discovery
Guizhen Mai; Shuiguo Peng; Yinghan Hong; Pinghua Chen
DOI: 10.1504/IJICS.2019.10014416
309-321System for DDoS attack mitigation by discovering the attack vectors through statistical traffic analysis
Mircho Jordanov Mirchev; Seferin Todorov Mirtchev
DOI: 10.1504/IJICS.2020.10029285
322-336HHDSSC: harnessing healthcare data security in cloud using ciphertext policy attribute-based encryption
Dharavath Ramesh; Rashmi Priya Sharma; Damodar Reddy Edla
DOI: 10.1504/IJICS.2020.10029286
337-356A categorical survey of state-of-the-art intrusion detection system-Snort
Alka Gupta; Lalit Sen Sharma
DOI: 10.1504/IJICS.2019.10026405
357-371A lightweight fully homomorphic encryption scheme for cloud security
V. Biksham; D. Vasumathi
DOI: 10.1504/IJICS.2019.10027473
372-395Fuzzy ARM and cluster analysis for database intrusion detection and prevention
Indu Singh; Nikhil Arora; Shivam Arora; Parteek Singhal
DOI: 10.1504/IJICS.2019.10024081
396-410Data encoding and cost optimised distribution for efficient and secure storage in cloud federation
Sonika Shrivastava; R.K. Pateriya
DOI: 10.1504/IJICS.2019.10021028
411-427Comparative study of classification approaches for e-mail analysis
Pranjal S. Bogawar; K.K. Bhoyar
DOI: 10.1504/IJICS.2019.10026264
428-443Intruder model for generating attack scenarios in computer systems
Lamia Hamza
DOI: 10.1504/IJICS.2019.10026017